Tagged Questions

Encryption is the process of transforming information (called plaintext) into an unreadable form (called ciphertext) using an encryption algorithm combined with a parameter (called an encryption key). Only those who possess the decryption key can reverse the process and recover the original ...

I have decrypted and saved an mp3 file into a blob storage.
However, when I decrypt and download the file I cant play it. I used an Mp3 validation tool which says "unknown file format". I believe it ...

I want to make a program that will decrypt an encrypted message in a text document. The key is the alphabet in numbers reversed, eg a=26, b=25, c=24 and so on.
I already have the means to encrypt the ...

I am having a challenge for my specific requirement... I would like to encrypt a stream on the go, passing each chunk of data(in a buffer) to the next process(es) until it is finally closed/disposed ...

I have a problem with an SQL query where the LOWER function does not work when I am decrypting with AES. This is a cut down version of the query:
SELECT LOWER(AES_DECRYPT(forename, 'encryptionkey')) ...

I have written a small piece of code (see below) to back-up files and folders on a USB drive to the local disk. The program works fine, however after encrypting the flash drive using BitLocker. I get ...

I am attempting to recover deleted files from an Apple Ipad Air using PhotoRec.
Using the PhotoRec guide I have jailbroken the Ipad, then used SSH and dd to make a low level copy of the flash memory ...

I'm creating server and client programs, and after reading about all that can go wrong with encryption I am still wondering if I am doing something terribly destructive.
I often read strong reactions ...

My question might sound too obvious but I am new to Amazon KMS.
After reading a lot of docs on AWS I understood that if I am using CMK directly for encryption and decryption I can directly do it by ...

I am using the mbed microcontroller and programming in c++. I have a string that contains JSON data. How do I convert the JSON string to a hexadecimal byte array to then later encrypt the data using ...

A small-scale web site, with content pages generated from a small amount of data: maximum six integers.
I'm wondering how to optimally design the URLs that point to these pages, so that users can't ...

I am developing a web application, in this application users will upload pdf files and they can sell this pdf, so i have a strict DRM for user's files, then on the other side those users who want that ...

I apologize in advance if my title is completely misleading.
I have a blog that is being developed. This blog requires its entries to be encrypted for specific people only to view. No one else, not ...

I have user sign in form. It has about 10 inputs. I want to save that user, random generate password and hash and salt it and save it. How to achieve that? I couldn't find any good tutorial for using ...

I have been using this to hash my passwords but I have a feeling it isn't very secure. I've been googling around to see if someone has decrypted a string using this. This is the encryption algorithm, ...

I've written a code in php (as a service) to decrypt passwords sent over a protocol. The protocol demands the password to be "Mac then Encrypt"ed (MtE) using AES256, then encoded using base-64.
The ...

please help.. error when i run my code.
i have decrypt function and i want use decrypt in mysql_query liske this.
$fsm = mysql_result(mysql_query("SELECT SUM(decryptZ(paid)) FROM sjk WHERE date LIKE ...

I need to go through the subdirectories of a given directory, search for excel files and then read their sheet names. A problem occurs when the loop finds an encrypted file. I tried to read files with ...

I want to implement in-app messaging in my iOS and Android application, and I am unsure about how the backend functionality should be created. From before my backend is running with Node.js and users ...

Question
I have a camel route that reads 4 xml files and encrypts them using camel crypto. I have another route that picks up these encrypted files, decrypts and saves them to file system. It works ...

i am testing a webservice with following security policies applied .
1)policy:Wssp1.2-2007-Wss1.1-X509-Basic256.xml
2)policy:Wssp1.2-2007-SignBody.xml
3)policy:Wssp1.2-2007-EncryptBody.xml
I am able ...

I want to learn the basics of AES encryption so I started to make a very simple Java program. The program loads a text file to a string and asks key from the user. After this the program uses AES to ...